Vulnerabilities (CVE)

Filtered by vendor Mbconnectline Subscribe
Filtered by product Mbconnect24
Total 33 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2020-24570 1 Mbconnectline 2 Mbconnect24, Mymbconnect24 2024-11-21 4.3 MEDIUM 6.5 MEDIUM
An issue was discovered in MB CONNECT LINE mymbCONNECT24 and mbCONNECT24 through 2.6.1. There is a CSRF issue (with resultant SSRF) in the com_mb24proxy module, allowing attackers to steal session information from logged-in users with a crafted link.
CVE-2020-24569 1 Mbconnectline 2 Mbconnect24, Mymbconnect24 2024-11-21 4.0 MEDIUM 4.3 MEDIUM
An issue was discovered in MB CONNECT LINE mymbCONNECT24 and mbCONNECT24 through 2.6.1. There is a blind SQL injection in the knximport component via an advanced attack vector, allowing logged in attackers to discover arbitrary information.
CVE-2020-24568 1 Mbconnectline 2 Mbconnect24, Mymbconnect24 2024-11-21 4.0 MEDIUM 6.5 MEDIUM
An issue was discovered in MB CONNECT LINE mymbCONNECT24 and mbCONNECT24 through 2.6.1. There is a blind SQL injection in the lancompenent component, allowing logged-in attackers to discover arbitrary information.
CVE-2020-12530 1 Mbconnectline 2 Mbconnect24, Mymbconnect24 2024-11-21 4.3 MEDIUM 4.3 MEDIUM
An issue was discovered in MB connect line mymbCONNECT24 and mbCONNECT24 software in all versions through V2.6.2. There is an XSS issue in the redirect.php allowing an attacker to inject code via a get parameter.
CVE-2020-12529 1 Mbconnectline 2 Mbconnect24, Mymbconnect24 2024-11-21 5.0 MEDIUM 5.8 MEDIUM
An issue was discovered in MB connect line mymbCONNECT24 and mbCONNECT24 software in all versions through V2.6.2 There is a SSRF in the LDAP access check, allowing an attacker to scan for open ports.
CVE-2020-12528 1 Mbconnectline 2 Mbconnect24, Mymbconnect24 2024-11-21 4.0 MEDIUM 6.5 MEDIUM
An issue was discovered in MB connect line mymbCONNECT24 and mbCONNECT24 software in all versions through V2.6.2. Improper use of access validation allows a logged in user to kill web2go sessions in the account he should not have access to.
CVE-2020-12527 2 Helmholz, Mbconnectline 4 Myrex24, Myrex24.virtual, Mbconnect24 and 1 more 2024-11-21 6.8 MEDIUM 6.5 MEDIUM
An issue was discovered in MB connect line mymbCONNECT24, mbCONNECT24 and Helmholz myREX24 and myREX24.virtual in all versions through v2.11.2. Improper access validation allows a logged in user to shutdown or reboot devices in his account without having corresponding permissions.
CVE-2020-10384 1 Mbconnectline 2 Mbconnect24, Mymbconnect24 2024-11-21 7.2 HIGH 7.8 HIGH
An issue was discovered in the MB CONNECT LINE mymbCONNECT24 and mbCONNECT24 software in all versions through 2.6.1. There is a local privilege escalation from the www-data account to the root account.
CVE-2020-10383 1 Mbconnectline 2 Mbconnect24, Mymbconnect24 2024-11-21 7.5 HIGH 9.8 CRITICAL
An issue was discovered in the MB CONNECT LINE mymbCONNECT24 and mbCONNECT24 software in all versions through 2.5.0. There is an unauthenticated remote code execution in the com_mb24sysapi module.
CVE-2020-10382 1 Mbconnectline 2 Mbconnect24, Mymbconnect24 2024-11-21 6.5 MEDIUM 8.8 HIGH
An issue was discovered in the MB CONNECT LINE mymbCONNECT24 and mbCONNECT24 software in all versions through 2.5.0. There is an authenticated remote code execution in the backup-scheduler.
CVE-2020-10381 1 Mbconnectline 2 Mbconnect24, Mymbconnect24 2024-11-21 5.0 MEDIUM 5.3 MEDIUM
An issue was discovered in the MB CONNECT LINE mymbCONNECT24 and mbCONNECT24 software in all versions through 2.5.0. There is an unauthenticated SQL injection in DATA24, allowing attackers to discover database and table names.
CVE-2024-45272 2 Helmholz, Mbconnectline 23 Myrex24 V2 Virtual Server, Rex 200, Rex 200 Firmware and 20 more 2024-10-17 N/A 7.5 HIGH
An unauthenticated remote attacker can perform a brute-force attack on the credentials of the remote service portal with a high chance of success, resulting in connection lost.
CVE-2024-45273 2 Helmholz, Mbconnectline 27 Myrex24 V2 Virtual Server, Rex 100, Rex 100 Firmware and 24 more 2024-10-17 N/A 7.8 HIGH
An unauthenticated local attacker can decrypt the devices config file and therefore compromise the device due to a weak implementation of the encryption used.